Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

E-commerce Security: Understanding Security Zones, Levels, and Settings in Web Browsers, Slides of Fundamentals of E-Commerce

An overview of security zones, levels, and settings in web browsers for ensuring e-commerce security. It covers the different security settings based on the origin of information, security levels in docsity.com, and security settings in netscape navigator. The document also discusses the importance of client security, communication channel security, and server security in e-commerce.

Typology: Slides

2012/2013

Uploaded on 07/30/2013

asif.ali
asif.ali 🇮🇳

5

(3)

146 documents

1 / 10

Toggle sidebar

Related documents


Partial preview of the text

Download E-commerce Security: Understanding Security Zones, Levels, and Settings in Web Browsers and more Slides Fundamentals of E-Commerce in PDF only on Docsity! Security zones • You can specify different security settings based on the origin of the information being downloaded. • There are four zones: – Internet: Anything not classified in another way – Local intranet: The internal network – Trusted sites – Restricted sites: Web sites you do not trust Docsity.com Security levels • High: Safer but less functional; less secure features are disabled; cookies are disabled. • Medium: Safe but functional browsing; prompts before downloading potentially unsafe content; unsigned ActiveX will not be downloaded. • Medium-low: Downloads everything with prompts; most content will be run without prompts; unsigned ActiveX will not be downloaded. • Low: Minimal safeguards; most content will be downloaded and run without prompts; all active content can be run. Docsity.com Outline E-commerce security is best studied by examining the overall process, beginning with the consumer and ending with the commerce server. This analysis produces a three part structure: 1. Client security 2. Communication channel security 3. Server security Docsity.com Communication channel threats • The Internet was designed for redundancy, not secure communications. The DOD intended to encrypt all information moving in the network. • The Internet remains in its insecure state. • It is impossible to guarantee that every computer through which information passes is safe, secure, and non-hostile. • The possible security violations include secrecy, integrity, and necessity threats. Docsity.com Sniffer programs • E-mail transmissions can be compromised by the theft of sensitive or personal information. • Sniffer programs record information as it passes through a particular router. • This can capture: – Passwords – Credit card numbers – Proprietary corporate product information Docsity.com
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved